A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cho, Jaeik | - |
dc.contributor.author | Lee, Changhoon | - |
dc.contributor.author | Cho, Sanghyun | - |
dc.contributor.author | Song, Jung Hwan | - |
dc.contributor.author | Lim, Jongin | - |
dc.contributor.author | Moon, Jongsub | - |
dc.date.accessioned | 2022-12-20T18:12:37Z | - |
dc.date.available | 2022-12-20T18:12:37Z | - |
dc.date.created | 2022-08-27 | - |
dc.date.issued | 2010-04 | - |
dc.identifier.issn | 1569-190X | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/175157 | - |
dc.description.abstract | In network data analysis, research about how accurate the estimation model represents the universe is inevitable. As the speed of the network increases, so will the attacking methods on future generation communication network. To correspond to these wide variety of attacks, intrusion detection systems and intrusion prevention systems also need a wide variety of counter measures. As a result, an effective method to compare and analyze network data is needed. These methods are needed because when a method to compare and analyze network data is effective, the verification of intrusion detection systems and intrusion prevention systems can be trusted. In this paper, we use extractable standard protocol information of network data to compare and analyze the data of MIT Lincoln Lab with the data of KDD CUP 99 (modeled from Lincoln Lab). Correspondence Analysis and statistical analyzing method is used for comparing data. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCIENCE BV | - |
dc.title | A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Song, Jung Hwan | - |
dc.identifier.doi | 10.1016/j.simpat.2009.09.003 | - |
dc.identifier.scopusid | 2-s2.0-76949102098 | - |
dc.identifier.wosid | 000276118100004 | - |
dc.identifier.bibliographicCitation | SIMULATION MODELLING PRACTICE AND THEORY, v.18, no.4, pp.431 - 435 | - |
dc.relation.isPartOf | SIMULATION MODELLING PRACTICE AND THEORY | - |
dc.citation.title | SIMULATION MODELLING PRACTICE AND THEORY | - |
dc.citation.volume | 18 | - |
dc.citation.number | 4 | - |
dc.citation.startPage | 431 | - |
dc.citation.endPage | 435 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Interdisciplinary Applications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.subject.keywordPlus | CROSS-CLASSIFICATIONS | - |
dc.subject.keywordPlus | ORDERED CATEGORIES | - |
dc.subject.keywordPlus | CONTINGENCY-TABLES | - |
dc.subject.keywordPlus | ASSOCIATION MODELS | - |
dc.subject.keywordAuthor | Data set | - |
dc.subject.keywordAuthor | Network data modeling | - |
dc.subject.keywordAuthor | Network data quantification | - |
dc.subject.keywordAuthor | Intrusion detection | - |
dc.subject.keywordAuthor | KDD CUP 99 | - |
dc.identifier.url | https://www.sciencedirect.com/science/article/pii/S1569190X09001270?via%3Dihub | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.